On Friday, February 03, 2012 01:58:11 PM Murray S. Kucherawy wrote:
>    The mechanisms described in this memo are primarily intended for use
>    in generating reports to aid implementers of [DKIM] and [ADSP] and
>    other related protocols in development and debugging.  They are not
>    intended for prolonged forensic use.  However, such uses are possible
>    by ADMDs that want to keep a close watch for fraud or infrastructure
>    problems.

I probably missed a discussion about this sometime, but why isn't this 
intended for prolonged forensic use?  The applications of ARF I've seen that's 
exactly what they are for.

Scott K
_______________________________________________
marf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/marf

Reply via email to